CN101458638B - Large scale data verification method for embedded system - Google Patents

Large scale data verification method for embedded system Download PDF

Info

Publication number
CN101458638B
CN101458638B CN2007100324320A CN200710032432A CN101458638B CN 101458638 B CN101458638 B CN 101458638B CN 2007100324320 A CN2007100324320 A CN 2007100324320A CN 200710032432 A CN200710032432 A CN 200710032432A CN 101458638 B CN101458638 B CN 101458638B
Authority
CN
China
Prior art keywords
data
cipher key
embedded system
checkout code
target cipher
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN2007100324320A
Other languages
Chinese (zh)
Other versions
CN101458638A (en
Inventor
冯云庆
彭登科
张�浩
苏丹
胡胜发
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Ankai Microelectronics Co.,Ltd.
Original Assignee
Anyka Guangzhou Microelectronics Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Anyka Guangzhou Microelectronics Technology Co Ltd filed Critical Anyka Guangzhou Microelectronics Technology Co Ltd
Priority to CN2007100324320A priority Critical patent/CN101458638B/en
Publication of CN101458638A publication Critical patent/CN101458638A/en
Application granted granted Critical
Publication of CN101458638B publication Critical patent/CN101458638B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The invention discloses a large scale data checking method for embedded system, comprising: step1, sectional processing the initial data need to be checked on PC machine by a cipher key algorithm processor and obtaining the target cipher key check code corresponding to data of each segment; step 2, storing the target cipher key check code obtained from the data of each segment in step 1 into a corresponding target cipher key check code file; step3, transmitting the target cipher key checkout code file obtained in the step 2 from the PC machine by a transmission device into the embedded system; step 4, generating the check code for the data in each same segment by the cipher key algorithm, comparing the target cipher key check code and processing the result. The invention can save the storage space of the data greatly, thereby reducing the cost using the memory, improving the work efficiency of the data check and ensuring the correctness of the check result.

Description

A kind of large scale data verification method that is used for embedded system
Technical field
The present invention relates to a kind of data verification method, particularly relate to a kind of large scale data verification method that is used for embedded system.
Background technology
Large-scale data are to produce under the situation that the fast development of current information technology and high capacity memory make rapid progress, but, the generation of large-scale data has also caused the appearance of another problem, is exactly how to know apace whether the data that produced are correct.Because large-scale data all is hundreds of million usually, even higher capacity, thus brought very big difficulty for the checking work of data, especially storage resources be of great rarity with and in the lower embedded system of processor speed, it is particularly outstanding that this problem seems.
Singularity based on embedded system itself, so that this system aspect processing speed, storage space all far away less than PC, and the widespread use of large-scale data in embedded system, more highlighted in embedded system, the data verification method of traditional approach is the weak point of large-scale data verification mode:
(1) owing in the built-in multimedia performance history, runs into the large-scale data amount carried out checking work through regular meeting, but tend to run into the situation of the insufficient memory on the development board, such as decoded data, in this case if the correctness of checking decoding back data is to bother very much with time-consuming;
(2) the general and decoded data volume of data volume before the decoding differs greatly, such as being compressed of one 1,000,000 capacity the decompressed data that after decoding, obtains of bit stream data be tens even hundreds of million, so decoded data volume is very large, if these data are stored with storer, will inevitably increase cost so.
Therefore the arithmetic speed of embedded system tends to allow work very consuming time PC finish, and carries out key and simple working with embedded system well below PC, could improve the efficient of data verification work like this.The method and the weak point thereof of data verification in embedded system at present are roughly as follows:
Method one: when whether the data that will compare two files under normal conditions equate fully; usually can be disposable (smaller at file; perhaps under the situation that internal memory is enough big) data of needs comparison are read in the corresponding core buffer; perhaps file data is read in the corresponding core buffer one section one section ground by loop statement in batches; byte-by-byte then or compare by turn; by this method as can be seen; data volume according to original data block constantly becomes big; also require to prepare a data block of size fully simultaneously indirectly; only in this way just can carry out the comparison of data, and the consumption of memory headroom will be doubled and redoubled at this moment.Perhaps can not cause big influence under the few situation of data volume to embedded system, but when needing data volume relatively to reach tens or more the time, the work efficiency of using the embedded system (comprising hardware and software) of this classic method will be lower at every turn.
Method two: because data are too big, can upload to data on the external unit (as PC) from embedded system usually, verify again.Generally speaking, upload data to PC or other devices all are to be undertaken by serial ports or USB (USB (universal serial bus)) from embedded type terminal equipment, and embedded system can be subjected to file system by the USB mouth to transmitting data, can keep flash memory, the restriction of each side such as the processing power of embedded system, so cause its transmission performance to reduce greatly, through the test proof, at present the logical USB2.0 of the embedded system maximum transfer speed that makes progress is in the 5MB/s, as comparing 1,000,000 part of H263 (a kind of video standard coding) CIF (high * is wide=352*288) yuv data after the formats, its data volume is 1,000,000* (352*288*2)=202752000000 Bytes if the time that the data more than having transmitted so will spend, the chances are 640 minutes, reaches about 10 hours.So this efficient is very low.Though this method has been alleviated the problem of memory space inadequate to a certain extent, its transmittability can not satisfy the needs of large-scale data far away.
Summary of the invention
The object of the present invention is to provide a kind of simple efficient, cost is lower and verification is correct large scale data verification method that is used for embedded system.
Purpose of the present invention realizes by following technical scheme: a kind of large scale data verification method that is used for embedded system, and its processing procedure may further comprise the steps:
Step 1 will need the raw data verified staging treating on request on PC, obtain each index segment data corresponding target cipher key check code by the key algorithm processor then;
Step 2 is stored in the target cipher key checkout code that obtains each index segment data in the step 1 in the corresponding target cipher key checkout code file;
Step 3 is transferred to the resulting target cipher key checkout code file of step 2 embedded system by transmitting device (USB or serial ports) from PC, and preserves with the form of file.
Step 4 in embedded system, generates check code to the data of each same section by key algorithm, compares with target cipher key checkout code, and carries out result treatment.
Concrete processing procedure in the described step (1): read one piece of data earlier, calculate the target cipher key checkout code of current this segment data, and then target cipher key checkout code is stored in the corresponding cipher key checkout code file with the key algorithm processor; Repeat above-mentioned processing procedure, all dispose up to the raw data that will carry out verification.Obtain the corresponding target cipher key check code thus and reach the corresponding secret key checkout code file of wherein putting into above-mentioned target cipher key checkout code.
Described step (3) is to be transferred to the embedded system by transmitting device (usb) and to be loaded in the Installed System Memory from PC cipher key checkout code file is disposable, forms target cipher key checkout code one dimension table.
The concrete processing procedure of described step 4:
In the raw data of embedded system, read one section with PC on the consistent data of data segment index position;
Embedded system generates check code to the data of this same section by key algorithm, and the mode by order reads or index reads reads article one target cipher key checkout code, and the cipher key checkout code that generates with current embedded system compares;
If the comparative result coupling, continuing to handle next section needs data relatively, and the corresponding check code of regeneration compares with next bar target cipher key checkout code; If comparative result does not match, withdraw from data verifying program and carry out the next round data check or withdraw from verification work.
Compared with prior art, adopt method of the present invention that following advantage is arranged:
1, saved the storage space of data greatly, made memory-aided cost thereby reduce;
2, accelerate data speed relatively, improved the work efficiency of data check;
3, with respect to tradition and loaded down with trivial details data verification method, greatly reduce the work complexity in operating process;
4, because the high hash of ripe key algorithm can be guaranteed the correctness of check results and assurance checking result's uniqueness.
Description of drawings
Fig. 1 is an overall procedure synoptic diagram of the present invention;
Fig. 2 holds pretreated schematic flow sheet for PC of the present invention;
The schematic flow sheet that Fig. 3 handles for embedded system end checking of the present invention.
Embodiment
As Fig. 1, Fig. 2 and shown in Figure 3, a kind of large scale data verification method that is used for embedded system of the present invention specifically comprises the steps:
(1) on PC, the raw data file that needs checking is read in segmentation in order, and the data that read are sent into key algorithm processor (as: MD5, HASH algorithms such as SHA1); Use the key algorithm processor to calculate the target cipher key checkout code of current one piece of data, and then the target check code is stored in the corresponding cipher key checkout code file, and repeat this processing procedure, all dispose up to the raw data that will carry out verification, obtain corresponding cipher key checkout code thus and reach the corresponding secret key checkout code file of wherein putting into above-mentioned cipher key checkout code.
(2) be transferred to embedded system from PC by transmitting device (USB USB (universal serial bus) or serial ports) and preserve resulting target cipher key checkout code file is disposable with document form.
Above step is to prepare for later data check.It is workload and storage space in order to reduce embedded system biglyyer that employing is carried out pre-service at PC end, because the verification work of data is to finish in the embedded system the inside, must finish most work consuming time earlier on PC; In addition, because PC can't influence the operate as normal of goal systems when handling above-mentioned work, so the method that adopts the data check to the PC end pre-service of mass data and embedded system to combine can be increased work efficiency greatly.
Because the target cipher key checkout code file that generates is not very big, such as 100,000 piece of data, be 100 from the shared storage space of the target cipher key checkout code of PC so, 000*16 Bytes=1,600,000 Bytes=1.5MB are so in general embedded system, can disposable cipher key checkout code file be loaded in the internal memory, thus, form a virtual key one dimension table, so that read when comparing later on.
(3) before comparison, earlier disposable being loaded in the Installed System Memory of school sign indicating number sign indicating number file that before downloaded in the embedded system; And form an one dimension table.
(4) then in embedded system, read one section with PC on the consistent raw data of data segment index position, in embedded system, this segment data is passed through key algorithm (as: MD5 then, HASH algorithms such as SHA1) generate cipher key checkout code, the last target cipher key checkout code identical with index position in the key one dimension table compares.Can carry out result treatment (as: statistical result waits operation) after relatively finishing.
When embedded system generates the cipher key checkout code of this segment data with the data of same index section by key algorithm according to raw data, read or mode by index by order, read article one target cipher key checkout code in the key one dimension table, the cipher key checkout code that generates with current embedded system compares, when the two is unequal, withdraw from data verifying program; Perhaps continue to handle the data that next group need compare, generate the corresponding secret key check code, compare with the data of the corresponding index position of next bar in the key one dimension table.
Pre-service of PC end and the implementation that relatively combines of the result of later stage in embedded system by early stage, compare 1,000,000 piece of data as can be seen if desired, be 1 from the shared storage space of the target cipher key checkout code of PC so, 000,000*16 Bytes=16,000,000 Bytes=15MB, if and use the most original comparative approach, as the yuv data after the H263 CIF formats relatively, the yuv data of less than 80 frames is only enough put in the space of 15MB.So realize data verification with the present invention, 1,000,000 piece of data can be deposited in the space of 15MB, and operates with traditional verification method, and 80 piece of data can only be deposited in the space of 15MB.So the technical scheme among use the present invention can be so that realize higher work efficiency under identical hardware condition.The present invention is particularly useful for the checking of multimedia packed data decoding back data check and relatively works.
Clearly saved a large amount of storage space and improved work efficiency greatly by the present invention, under the very limited condition of storage space, realized purpose that large-scale data is verified thereby reach.

Claims (4)

1. large scale data verification method that is used for embedded system is characterized in that may further comprise the steps:
Step 1 will need the raw data verified staging treating on request on PC, obtain each index segment data corresponding target cipher key check code with the key algorithm processor then;
Step 2 is stored in the target cipher key checkout code that obtains each segment data in the step 1 in the corresponding target cipher key checkout code file;
Step 3 is transferred to the resulting target cipher key checkout code file of step 2 in the embedded system by transmitting device from PC;
Step 4 in embedded system, generates cipher key checkout code to the data of each same section by key algorithm, compares with target cipher key checkout code in the described target cipher key checkout code file, and carries out result treatment.
2. large scale data verification method according to claim 1, it is characterized in that: the concrete processing procedure in the described step 1: read one piece of data earlier, calculate the target cipher key checkout code of current this segment data with the key algorithm processor, and then target cipher key checkout code is stored in the corresponding cipher key checkout code file; Repeat above-mentioned processing procedure, all dispose up to the raw data that will carry out verification.
3. large scale data verification method according to claim 1, it is characterized in that: described step 3 is to be loaded into the embedded system memory by transmitting device transmission from PC target cipher key checkout code file is disposable, and forms target cipher key checkout code one dimension table.
4. large scale data verification method according to claim 1 is characterized in that: the concrete processing procedure of described step 4:
In the raw data of embedded system, read one section with PC on the consistent data of data segment index position;
Embedded system generates cipher key checkout code to the data of this same section by key algorithm, by the mode that order reads or index reads, read the target cipher key checkout code of respective index position consistency, the cipher key checkout code that generates with current embedded system compares;
If the comparative result coupling, continuing to handle next section needs data relatively, and the corresponding check code of regeneration compares with next bar target cipher key checkout code; If comparative result does not match, withdraw from data verifying program and carry out the next round data check or withdraw from verification work.
CN2007100324320A 2007-12-13 2007-12-13 Large scale data verification method for embedded system Active CN101458638B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2007100324320A CN101458638B (en) 2007-12-13 2007-12-13 Large scale data verification method for embedded system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2007100324320A CN101458638B (en) 2007-12-13 2007-12-13 Large scale data verification method for embedded system

Publications (2)

Publication Number Publication Date
CN101458638A CN101458638A (en) 2009-06-17
CN101458638B true CN101458638B (en) 2010-09-01

Family

ID=40769512

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2007100324320A Active CN101458638B (en) 2007-12-13 2007-12-13 Large scale data verification method for embedded system

Country Status (1)

Country Link
CN (1) CN101458638B (en)

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102354294B (en) * 2011-08-23 2015-04-22 西安空间无线电技术研究所 Method for detecting spatial single event upset of space-borne DSP (Digital Signal Processor) chip
CN103116546B (en) * 2013-02-21 2015-08-19 北京控制工程研究所 The ground automated verification system of a kind of satellite extensive modification of program in-orbit
CN106055933B (en) * 2016-06-24 2019-08-23 武汉斗鱼网络科技有限公司 A kind of method and system of client software code check
CN107223322B (en) * 2017-04-25 2020-07-24 深圳市汇顶科技股份有限公司 Signature verification method, device and system
CN110058952B (en) * 2018-01-18 2022-08-19 株洲中车时代电气股份有限公司 Method and system for verifying embedded equipment file
CN111327397B (en) * 2020-01-21 2021-02-02 武汉大学 Longitudinal redundancy check error correction coding and decoding method for information data
CN111367926A (en) * 2020-02-27 2020-07-03 星辰天合(北京)数据科技有限公司 Data processing method and device for distributed system
CN112615840B (en) * 2020-12-11 2023-05-26 北京北信源软件股份有限公司 Method and system for authenticating admission of embedded equipment
CN113377778B (en) * 2021-07-01 2022-04-22 上海英方软件股份有限公司 Method and device for comparing differences of database tables
CN117079703B (en) * 2023-10-17 2024-02-02 紫光同芯微电子有限公司 Method and device for testing embedded memory of chip and electronic equipment

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1316073A (en) * 1999-07-01 2001-10-03 布尔Cp8公司 Method for verifying code transfermers for incorporated system, in particular in chip card
CN1395191A (en) * 2001-06-28 2003-02-05 株式会社日立制作所 Data verification method, data verification device and processing program products thereof
CN1565117A (en) * 2001-08-10 2005-01-12 科里普托马迪克公司 Data certification method and apparatus

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1316073A (en) * 1999-07-01 2001-10-03 布尔Cp8公司 Method for verifying code transfermers for incorporated system, in particular in chip card
CN1395191A (en) * 2001-06-28 2003-02-05 株式会社日立制作所 Data verification method, data verification device and processing program products thereof
CN1565117A (en) * 2001-08-10 2005-01-12 科里普托马迪克公司 Data certification method and apparatus

Also Published As

Publication number Publication date
CN101458638A (en) 2009-06-17

Similar Documents

Publication Publication Date Title
CN101458638B (en) Large scale data verification method for embedded system
US7924183B2 (en) Method and system for reducing required storage during decompression of a compressed file
KR101945026B1 (en) Apparatus and method for single pass entropy detection on data transfer
US8111704B2 (en) Multiple compression techniques for packetized information
WO2014021837A1 (en) Entropy coding and decoding using polar codes
US20140358872A1 (en) Storage system and method for performing deduplication in conjunction with host device and storage device
CN104202054A (en) Hardware LZMA (Lempel-Ziv-Markov chain-Algorithm) compression system and method
US20110307471A1 (en) Accelerating Database Management System Operations
WO2018072688A1 (en) Quick loading method for kernel image file, and apparatus
CN103106068A (en) Internet of things big data fast calibration method
CN103248369A (en) Compression system and method based on FPFA (Field Programmable Gate Array)
CN106648955B (en) Compression method and related device
US20160173126A1 (en) Techniques to accelerate lossless compression
WO2022143536A1 (en) Apsoc-based state cipher calculation method, system, device, and medium
CN114764407A (en) Method for near memory acceleration for accelerator and dictionary decoding
US11601283B2 (en) Message authentication code (MAC) based compression and decompression
CN116455559A (en) Implementation method and device of soft and hard collaboration high-speed password equipment and electronic equipment
CN103995827A (en) High-performance ordering method for MapReduce calculation frame
Hu et al. {QZFS}:{QAT} Accelerated Compression in File System for Application Agnostic and Cost Efficient Data Storage
US10911063B2 (en) Adaptive speculative decoding
CN112256633A (en) Command-driven commercial password special processor system
US9455742B2 (en) Compression ratio for a compression engine
CN1943202A (en) Data encoding and decoding in a data storage system
US20170103333A1 (en) Subset encoding method: increasing pattern density for finite automata
CN202931290U (en) Compression hardware system based on GZIP

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CP03 Change of name, title or address

Address after: 510663 301-303, 401-402, area C1, 182 science Avenue, Science City, Guangzhou high tech Industrial Development Zone, Guangdong Province

Patentee after: Guangzhou Ankai Microelectronics Co.,Ltd.

Address before: 510663 301-303, 401-402, zone C1, 182 science Avenue, Science City, Guangzhou high tech Industrial Development Zone, Guangdong Province

Patentee before: ANYKA (GUANGZHOU) MICROELECTRONICS TECHNOLOGY Co.,Ltd.

CP03 Change of name, title or address
CP02 Change in the address of a patent holder

Address after: 510555 No. 107 Bowen Road, Huangpu District, Guangzhou, Guangdong

Patentee after: Guangzhou Ankai Microelectronics Co.,Ltd.

Address before: 510663 301-303, 401-402, area C1, 182 science Avenue, Science City, Guangzhou high tech Industrial Development Zone, Guangdong Province

Patentee before: Guangzhou Ankai Microelectronics Co.,Ltd.

CP02 Change in the address of a patent holder